www.soundshore.nethubfssoundshore-siteheader-img-2

The Next Level Network Blog

IT Management, Security, Compliance for Regulated Firms

Announcing a New eBook: 16 Essential Tips for Successful Technology Relocation

Aug 1, 2019 9:00:00 AM / by Eric Benda, CEO posted in Business Continuity Plan, Office Move, IT Relocation, Business Continuity

0 Comments

Business Continuity Management When You Move Offices; Download for Free

Lately, we’ve been helping at least one company per week with technology relocation as they move offices. Most, in line with some recent studies, are moving to accommodate growth. In fact, we are one of the companies we moved just a couple of weeks ago to accommodate our own growth. So, office technology relocation is top of mind for us in more ways than one.

Read More

Crypto Mining Tools Are Overtaking Ransomware Attacks as a Cyber Threat

Jul 10, 2019 1:16:39 PM / by Liege Payne, Director of Sales & Business Development posted in Ransomware, Soundshore Technology Group, Crypto Mining Tools

0 Comments

Longer-term Payoffs, Lower Tech Skill Requirements Motivating More Bad Actors

A new cyber threat – crypto mining – began in 2017, accelerated in 2018 and is exploding in 2019, overtaking ransomware attacks to become one of the most prolific threats out there. More correctly termed ‘crypto jacking’ when used for nefarious purposes, crypto mining, when used legally, is a part of the cryptocurrency ecosystem that helps to keep track of ‘blocks’ of cryptocurrency as they’re created. Legitimate crypto miners use crypto mining tools on their computers that may earn them a few pennies for their efforts to help maintain and/or increase the value of cryptocurrencies.

Read More

Announcing a Free Tool to Walk You Through the Steps to Business Continuity and Disaster Recovery

Jun 25, 2019 9:00:00 AM / by Eric Benda, CEO posted in Disaster Recovery, Business Continuity, DATTO

0 Comments

"The Ultimate Disaster Recovery Checklist" Offers a Rational Response to a Stressful Experience

We recently launched a free eBook on planning for business continuity and disaster recovery. Again in collaboration with our Disaster Recovery as a Service (DRaaS) solutions partner, DATTO, we’re announcing part two, "The Ultimate Disaster Recovery Checklist." Even if you have a plan in place, or are working on one, when disaster strikes, great stress is placed on the entire organization. It helps to have a handy tool like this checklist to help organize a rational response to what could be a chaotic and disarming experience.

Read More

Cyber Attacks on IoT Devices Are Rising

Jun 14, 2019 12:07:28 PM / by Eric Benda, CEO posted in cyber security, Soundshore Technology Group, IoT Cyber Attacks, SecureRF

0 Comments

Why More Secure Smart Devices Are Critical to Network Security

In recent years, there’s been a lot of attention on the Internet of Things (IoT). The IoT is revolutionizing many aspects of modern life, but it is also enabling unprecedented cyberattacks on IoT devices. It’s critical for businesses to understand how and why these attacks work, as well as why they must seek more secure smart devices to protect office network security. This is especially true of regulated industries including financial services and healthcare that are adopting IoT technologies to better serve their clients and patients. They must also deal with the downside.

According to its Wikipedia definition, IoT is the extension of Internet connectivity into physical devices and everyday objects. These devices can then communicate and interact with others over the Internet, and they can be remotely monitored and controlled. It’s easy to imagine how bad actors could exploit these factors to breach a smart home security system or to spy on an office conference room via a smart TV.

Read More

The BYOD Dilemma: Corporate Security vs Employee Privacy

Jun 7, 2019 3:16:29 PM / by Eric Benda, CEO posted in MaaS360, ManageEngine, BYOD, CYOD, COPE, corporate security, employee privacy

0 Comments

BYOD Issues Driving Changes to Device Management Strategy

Over a number of years, the practice of Bring Your Own Device (BYOD) has become commonplace in companies of all sizes. Employees have been granted permission to let their personal devices double for work – phones, tablets and laptops. BYOD evolved out of employee discontent with having to carry two phones or with finding themselves needing emails or files at home that were on an office computer. Companies began adopt BYOD policies. But those decisions are having unanticipated impacts. In today’s tense cyber security environment, pure and simple, BYOD makes it impossible to maintain a secure network. Mobile device management (MDM) software has been developed in an effort to secure company data on private devices. However, MDM can compromise user privacy. So, we end up needing ways to balance corporate security and employee privacy.

Read More

Announcing a Free eBook of Critical Importance to Your Company: 4 Business Continuity Planning Essentials

Jun 4, 2019 1:32:24 PM / by Eric Benda, CEO posted in Business Continuity Plan, Disaster Recover

0 Comments

Disaster Can Strike Any Company. What to Consider for Your Disaster Recovery Plan

It blows us away how many companies totally ignore the need for a business continuity and disaster recovery plan. We all like to hope for the best and chances are our companies will never experience a disaster that impedes our operations, shuts down our ability to do business for days or weeks on end, or harms our employees and our customers. But these days, chances are better that they will.

Read More

Microsoft Security: How MS Is Beefing Up Its Cyber Security Technology Brand

May 17, 2019 9:09:00 AM / by Liege Payne, Director of Sales & Business Development posted in Cyber Security Training, Microsoft Security

0 Comments

According to Microsoft, there are more than 400 million active users of its Windows 10 operating system worldwide. Estimates have the number of MS Office 365 users at 180 million. In addition to the productivity features that have led to this success, Microsoft Security has put a strong focus on cyber security technology as threats have increased exponentially in recent years. Frequent software updates fix vulnerabilities and issues as they’re discovered. But the company is also looking forward and outward in an effort to prevent cyberattacks and minimize cyber security risk. This post focuses on some of the initiatives the company is involved in beyond actual product development and touches on some product security improvements.

Read More

Does the EU’s GDPR Affect US Data Privacy and Cyber Security Compliance Strategy?

May 8, 2019 2:21:06 PM / by Eric Benda, CEO posted in Compliance, cyber security, data privacy

0 Comments

Yes, Especially Regulated Industries. And US Regulations Are Coming. Prepare.

Read More

Penetration Testing Tools: In Hackers’ Hands New Modlishka Tool is a Cyber Security Threat

Apr 25, 2019 9:00:00 AM / by Jennifer Valle, Director of Marketing and Operations posted in cyber security, penetration testing, phishing, multi-factor authentication, Modlishka

0 Comments

Can Overcome Multi-factor Authentication and Enable Phishing

As a basic element of cyber security programs, penetration testing is standard protocol for detecting possible IT network vulnerabilities. There are many penetration testing tools available that simulate hacker attacks to discover cracks in firewalls and other defenses. Developers are constantly building new tools to keep up with evolving threats and the measures put in place to avert them.

Read More

Standardized Multi-factor Authentication Just Became a Reality

Apr 17, 2019 12:15:35 PM / by Liege Payne, Director of Sales & Business Development posted in Security, cyber security, U2F, multi-factor authentication

0 Comments

Tech Group The FIDO Alliance Is Leading Us to a Password-free Internet, Greater Security

What Is It?

One of the greatest fears today is that hackers will steal the passwords we use to access social, banking and other sites where we must register to take advantage of their features and offerings and steal our data. The threat for businesses – especially regulated entities – is that employees will fall for password-centric schemes, like phishing, that can compromise a company’s entire IT network. Better days are here – and even better ones are ahead.

Read More